Online Software Security Training
We are in business to make the highest quality of software security training. We do this by creating rigorous courses that go in-depth in often advanced areas of software security. Our courses are online and self-paced composed of high quality content and interactive hands-on learning. In addition you can reach out to an instructor at any point with questions you may have.
Are you a business looking to get access to all of our contents or custom course development?
Contact sales
Our services
In addition to our self-paced training, we offer the following services:
Custom Security Training
Bespoke and specialised training

In addition to our standard courses we also offer custom content creation. This can be both content creation for in-house in topics that revolve around your own products or extensions to our existing courses in more specialised feels.

We build content that uses our tailor-made training platform, which enables you to distribute your educational content to your entire organisation or clients instantly.

Security Automation
Automated vulnerability discovery

We offer years of experience in integrating security automation into technology development processes and understand the need for automation to improve the software development life cycle. Security automation is relevant if you seek continuous analysis of software whether it is for DevSecOps, vulnerability analysis, malware analysis or any other program analysis problem. Security automation is increasingly adopted by both big tech companies and startups and involves both offensive security testing and defensive security monitoring and analysis. We offer years of experience building tools and techniques that solve the most complex problems in security automation.

Application security & RE
For DevSecOps

Application Security: Assessing the security of a modern software package is a complex task that requires expertise knowledge and skills. We have years of experience doing this and can help you audit your software package for vulnerabilities and design flaws that may exist.

Reverse Engineering: Understanding software for which there is no source code is a complex and time-consuming task. We help you with any of your software reverse engineering needs, including for desktop applications, mobile applications, IoT devices and anything else.

Research & Development
Developing the next-generation of tools.

We offer research and development services. We have extensive experience in developing security products in both industry and academia. Our expertise are in areas of program analysis, security automation, binary analysis, software verification and automated vulnerability analysis. We can help in all stages of your project, such as idea generation and problem solving, implementation as well as using your product to have impact.

Analysis Center
Program Analysis
Corner

We maintain a blog for technical content related to software security and computer science relevant for software developers and security professionals.

Program Analysis Corner
Our YouTube channel
Latest from our blog

In this post we present four videos that cover the KLEE tool. KLEE is a symbolic execution engine that can be used to automate test-case generation as well as be used to find bugs

Fluent Bit is an open source log processor and part of the Cloud Native Computing Foundation. This fall the Linux Foundation partnered with Ada Logics to integrate automated vulnerability analysis of the Fluent Bit project.

In this article we will get started with go-fuzz, which is a popular open source fuzzing engine for Go applications.